Abstract
Research in user authentication has been a growing field in HCI. Previous studies have shown that peoples’ graphical memory can be used to increase password memorability. On the other hand, with the increasing number of devices with built-in motion sensors, kinesthetic memory (or muscle memory) can also be exploited for authentication. This paper presents a novel knowledge-based authentication scheme, called gesture password, which uses discrete gestures as password elements. The research presents a study of multiple password retention using PINs and gesture passwords. The study reports that although participants could use kinesthetic memory to remember gesture passwords, retention of PINs is far superior to retention of gesture passwords.
Chapter PDF
Similar content being viewed by others
References
Adams, A., Sasse, M.: Users are not the enemy. Communications of the ACM 42(12), 41–46 (1999)
Renaud, K.: Evaluating Authentication Mechanisms. In: Cranor, L., Garfinkel, S. (eds.) Security and Usability, pp. 103–128. O’Reilly Media, Inc., Sebastopol (2005)
Nelson, D.L., Reed, U.S., Walling, J.R.: Picture Superiority Effect. Journal of Experimental Psychology: Human Learning & Memory 2, 523–528 (1976)
Paivio, A., Csapo, K.: Picture superiority in free recall: Imagery or dual coding? Cognitive Psychology 5(2), 176–206 (1973)
Dhamija, R., Perrig, A.: Déjà vu: A user study using images for authentication. In: Proceedings of the 9th USENIX Security Symposium (2000)
Moncur, W., Leplâtre, G.: Pictures at the ATM: Exploring the usability of multiple graphical passwords. In: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 887–894. ACM Press, New York (2007)
Williamson, J., Murray-Smith, R., Hughes, S.: Shoogle: Excitatory multimodal interaction on mobile devices. In: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 121–124. ACM Press, New York (2007)
Patel, S., Pierce, J., Abowd, G.: A gesture-based authentication scheme for untrusted public Terminals. In: Proceedings of the 17th annual ACM symposium on User interface software and technology, pp. 157–160. ACM Press, New York (2004)
Mayrhofer, R., Gellersen, H.: Shake well before use: Authentication based on accelerometer data. In: Proceedings of the 5th International Conference on Pervasive Computing, pp. 144–161. Springer, London (2007)
De Luca, A., Weiss, R., Hussmann, H.: PassShape: stroke based shape passwords. In: Proceedings of the 19th Australasian conference on Computer-Human Interaction, pp. 239–240. ACM Press, New York (2007)
Weiss, R., De Luca, A.: PassShapes: utilizing stroke based authentication to increase password memorability. In: Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges, pp. 383–392. ACM Press, New York (2008)
Sharp, H., Rogers, Y., Preece, J.: Interaction Design: Beyond Human-Computer Interaction, 2nd edn. John Wiley & Sons, Chichester (2007)
Apple iPod Nano, http://www.apple.com/ipodnano/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Chong, M.K., Marsden, G. (2009). Exploring the Use of Discrete Gestures for Authentication. In: Gross, T., et al. Human-Computer Interaction – INTERACT 2009. INTERACT 2009. Lecture Notes in Computer Science, vol 5727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03658-3_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-03658-3_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03657-6
Online ISBN: 978-3-642-03658-3
eBook Packages: Computer ScienceComputer Science (R0)